SnoopSnitch's latest feature are tests to analyze whether a device’s build of the Android mobile operating system is missing security patches. The goal of this test is to identify if any patches are missing that should be included relative to the device’s current security patch level date.

This feature was introduced as part of the major 2.0 version update for SnoopSnitch.
For more information on our Android patch level analysis, you can review our presentation from Hack-in-the-box 2018 where we debuted and discussed the 2.0 version of SnoopSnitch [1]

h3. SnoopSnitch - Mobile network security tests

SnoopSnitch's original security tests focus on identifying potential attacks or surveillance against an individual device from the mobile network. SnoopSnitch collects and analyzes mobile radio data to make you aware of the overall security of the mobile network to which your device is connected and to warn you about threats like fake base stations (IMSI catchers), user tracking, and over-the-air updates. With SnoopSnitch you can use the data collected in the GSM Security Map at gsmmap.org and contribute your own data to GSM Map.

For more information about the mobile network security tests, you can review our presentation from 31c3 2014 where we debuted and discussed the initial 0.9 version of SnoopSnitch [2]

The mobile network security tests include an active part. First, your phone will place outgoing calls to a dedicated number. This number will always be busy and never answer in order to rule out voice charges as best as we can.

Second, your phone will send SMS short messages to an invalid number. In some cases, we saw operators charging for these kind of transactions transactions. Hence, please have an eye on your phone bill when performing active tests using SnoopSnitch. To control for involuntary charges, we strongly advise the use of a dedicated pre-paid SIM card for these tests.

Furthermore, our call server will call your phone and send test SMS during the active test. To avoid unnecessary costs on our side, *DO NOT PICK UP OR REJECT AUTOMATIC CALLS FROM OUR SERVER*. If you pick up a call or have a mailbox or auto-answer feature configured that picks up the call automatically you may get blacklisted and cannot use our service anymore. Please see our [[Banned]] wiki page for details.

SnoopSnitch is released under the GPL v3 license (cf. source:COPYING). The app is known to built under Linux and OS X, see source:README for build instructions.

h2. Mailing list

A public mailing list for discussions is "here":https://lists.srlabs.de/cgi-bin/mailman/listinfo/gsmmap
For specific questions to the snoopsnitch-team that do not require or permit public discussion, please contact us directly at *snoopsnitch [you know what to put here] srlabs.de*

As a primer to the snoopsnitch detection approach, we have prepared a set of hands-on "training material":https://opensource.srlabs.de/attachments/download/114/snoopsnitch_training_material.zip.
It contains network traces of IMSI catcher attacks and silent SMS and an analysis guide.